Certified Malware Analyst - Advanced Practical Malware Analysis with Exploit Kits

Save $450.00

Price:
Sale price$49.00 Regular price$499.00

Description

The Certified Malware Analyst course is an advanced training program that delves into practical malware analysis techniques, emphasizing the understanding and dissection of sophisticated malware and exploit kits.

This course is ideal for cybersecurity professionals who already have a basic understanding of malware and want to advance their skills in analyzing and responding to malware threats.

Participants will learn how to analyze malware samples, understand the inner workings of exploit kits, and develop strategies for defending against these threats.

The course includes hands-on labs, real-world case studies, and tools commonly used by professionals in the field, such as debuggers, disassemblers, and network traffic analysis tools.

Certified Malware Analyst Course Syllabus

Module 1: Introduction to Advanced Malware Analysis

  • Overview of Malware Types and Behaviors:
    • Understanding different types of malware (viruses, worms, trojans, ransomware)
    • Advanced malware characteristics (polymorphism, metamorphism, obfuscation)
  • Setting Up a Malware Analysis Lab:
    • Safe environment setup (virtual machines, sandboxes)
    • Tools and software for malware analysis

Module 2: Static Analysis Techniques

  • Basic Static Analysis:
    • File fingerprinting and metadata analysis
    • Analyzing malware without executing it (hashing, strings extraction)
  • Advanced Static Analysis:
    • Disassembly and decompilation (using tools like IDA Pro, Ghidra)
    • Analyzing code structure and identifying functions
  • Analyzing Obfuscated and Packed Malware:
    • Techniques for unpacking and deobfuscation
    • Identifying common packing techniques

Module 3: Dynamic Analysis Techniques

  • Basic Dynamic Analysis:
    • Executing malware in a controlled environment
    • Monitoring system changes (file system, registry, processes)
  • Advanced Dynamic Analysis:
    • Debugging malware (using OllyDbg, x64dbg)
    • Network traffic analysis (using Wireshark, tcpdump)
    • Memory analysis techniques (using Volatility, Rekall)

Module 4: Introduction to Exploit Kits

  • Understanding Exploit Kits:
    • Definition and purpose of exploit kits
    • Common exploit kits (Angler, Neutrino, Blackhole)
  • Exploit Kit Anatomy:
    • Structure and delivery mechanisms
    • Exploit kit infection chains

Module 5: Analysis of Exploit Kits

  • Exploit Kit Analysis Techniques:
    • Identifying and analyzing exploit kit payloads
    • Reverse engineering exploit kits
  • Case Studies and Real-World Examples:
    • Detailed analysis of specific exploit kits
    • Strategies used by attackers and defenses

Module 6: Malware Evasion Techniques and Countermeasures

  • Evasion Techniques:
    • Anti-analysis and anti-debugging techniques
    • Techniques used to avoid detection (sandbox evasion, encryption)
  • Countermeasures and Detection Strategies:
    • Implementing detection mechanisms (IDS/IPS, endpoint security)
    • Developing YARA rules for malware detection
    • Advanced threat hunting techniques

Module 7: Reporting and Documentation

  • Documenting Findings:
    • Creating detailed analysis reports
    • Communicating technical findings to non-technical stakeholders
  • Incident Response and Remediation:
    • Coordinating with incident response teams
    • Strategies for containment and eradication

Module 8: Hands-On Labs and Practical Exercises

  • Lab Environment:
    • Setting up and using a secure analysis environment
  • Practical Exercises:
    • Analyzing real malware samples
    • Dissecting exploit kits and understanding their operation
    • Implementing countermeasures in a simulated environment

What you will learn

  • Advanced Malware Types and Behaviors
  • Setting Up a Secure Malware Analysis Environment
  • Static and Dynamic Malware Analysis Techniques
  • Analyzing Obfuscated and Packed Malware
  • Exploit Kit Analysis
  • Evasion Techniques and Countermeasures
  • Threat Hunting and Detection Strategies
  • Incident Response and Remediation
  • Practical Hands-On Experience
  • Understanding Legal and Ethical Considerations

Course Duration

  • 100+ lectures
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
  • 5000+ students enrolled
  • Complete Practical Training
  • Download access
  • Watch Videos in Android and iOS App

Recently viewed